10.02.2016 Views

Bitcoin and Cryptocurrency Technologies

1Qqc4BN

1Qqc4BN

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

this interlocking interdependence between the security of the block chain, a healthy mining<br />

ecosystem <strong>and</strong> the exchange rate.<br />

Because of the cyclical nature of this three‐way dependence, the existence of each of these is<br />

predicated on the existence of the others. When <strong>Bitcoin</strong> was first created, none of these three<br />

existed. There were no miners other than Nakamoto himself running the mining software. <strong>Bitcoin</strong><br />

didn’t have a lot of value as a currency. And the block chain was, in fact, insecure because there was<br />

not a lot of mining going on <strong>and</strong> anybody could have easily overwhelmed this process.<br />

There’s no simple explanation for how <strong>Bitcoin</strong> went from not having any of these properties to having<br />

all three of them. Media attention was part of the story — the more people hear about <strong>Bitcoin</strong>, the<br />

more they’re going to get interested in mining. And the more they get interested in mining, the more<br />

confidence people will have in the security of the block chain because there’s now more mining<br />

activity going on, <strong>and</strong> so forth. Incidentally, every new Altcoin that wants to succeed also has to<br />

somehow solve this problem of pulling itself up by its bootstraps.<br />

51‐percent attack. ​Finally, let’s consider what would happen if consensus failed <strong>and</strong> there was in fact<br />

a ​51‐percent attacker​who controls 51 percent or more of the mining power in the <strong>Bitcoin</strong> network.<br />

We’ll consider a variety of possible attacks <strong>and</strong> see which ones can actually be carried out by such an<br />

attacker.<br />

First of all, can this attacker steal coins from an existing address? As you may have guessed, the<br />

answer is no, because stealing from an existing address is not possible unless you subvert the<br />

cryptography. It’s not enough to subvert the consensus process. This is not completely obvious. Let’s<br />

say the 51 percent attacker creates an invalid block that contains an invalid transaction that<br />

represents stealing <strong>Bitcoin</strong>s from an existing address that the attacker doesn’t control <strong>and</strong> transferring<br />

them to his own address. The attacker can pretend that it’s a valid transaction <strong>and</strong> keep building upon<br />

this block. The attacker can even succeed in making that the longest branch. But the other honest<br />

nodes are simply not going to accept this block with an invalid transaction <strong>and</strong> are going to keep<br />

mining based on the last valid block that they found in the network. So what will happen is that there<br />

will be what we call a fork in the chain.<br />

Now imagine this from the point of view of the attacker trying to spend these invalid coins, <strong>and</strong> send<br />

them to some merchant Bob as payment for some goods or service. Bob is presumably running a<br />

<strong>Bitcoin</strong> node himself, <strong>and</strong> it will be an honest node. Bob’s node will reject that branch as invalid<br />

because it contains an invalid transaction. It’s invalid because the signatures didn’t check out. So<br />

Bob’s node will simply ignore the longest branch because it’s an invalid branch. And because of that,<br />

subverting consensus is not enough. You have to subvert cryptography to steal bitcoins. So we<br />

conclude that this attack is not possible for a 51 percent attacker.<br />

We should note that all this is only a thought experiment. If there were, in fact, actual signs of a 51<br />

percent attack, what will probably happen is that the developers will notice this <strong>and</strong> react to it. They<br />

will update the <strong>Bitcoin</strong> software, <strong>and</strong> we might expect that the rules of the system, including the<br />

71

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!